Skip to content

Commit cf96054

Browse files
committed
++
1 parent 600a47d commit cf96054

File tree

1 file changed

+5
-11
lines changed

1 file changed

+5
-11
lines changed

rules/cross-platform/reconnaissance_web_server_unusual_spike_in_error_logs.toml

Lines changed: 5 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -12,20 +12,16 @@ as vulnerability scanning or fuzzing attempts by adversaries. These activities o
1212
responses as they probe for weaknesses in web applications. Error response codes may potentially indicate server-side
1313
issues that could be exploited.
1414
"""
15-
from = "now-61m"
16-
interval = "1h"
15+
from = "now-9m"
16+
interval = "10m"
1717
language = "esql"
1818
license = "Elastic License v2"
1919
name = "Web Server Unusual Spike in Error Logs"
20-
risk_score = 47
20+
risk_score = 21
2121
rule_id = "6631a759-4559-4c33-a392-13f146c8bcc4"
22-
severity = "medium"
22+
severity = "low"
2323
tags = [
24-
"Domain Scope: Single",
2524
"Domain: Web",
26-
"OS: Linux",
27-
"OS: macOS",
28-
"OS: Windows",
2925
"Use Case: Threat Detection",
3026
"Tactic: Reconnaissance",
3127
"Data Source: Nginx",
@@ -41,8 +37,6 @@ from
4137
logs-apache_tomcat.error-*,
4238
logs-apache.error-*,
4339
logs-iis.error-*
44-
| where
45-
@timestamp > now() - 1 hours
4640
| keep
4741
@timestamp,
4842
event.type,
@@ -55,7 +49,7 @@ from
5549
Esql.host_name_values = values(host.name),
5650
Esql.agent_id_values = values(agent.id),
5751
Esql.event_dataset_values = values(event.dataset)
58-
by source.ip
52+
by source.ip, agent.id
5953
| where
6054
Esql.event_count > 25
6155
| limit 100

0 commit comments

Comments
 (0)